2026;western Governors University
Correct
Incorrect
1 of 242
Term
An element of security testing is to identify software weaknesses so
that security violations and noncompliance with security
requirements that could cause the software to fail or be out of
compliance with any of software security requirements are avoided.
A False
B True
B C
D A
, 2 of 242
Term
A user was given a task to identify a nonfunctional acceptance
criteria.
Which nonfunctional requirement should be applied to the
acceptance criteria?
A Encryption used during data transfer
B Review of the most recent test results
C Software developed keeping downward compatibility intact
D Users divided into groups and the groups given separate rights
C B
F D
, 3 of 242
Term
Requirements and architecture as a front-end process to Agile
cycles is also known as___ _.
A dashes
B sprints
C pushes
D rushes
D B
A C
4 of 242
Term
Which artifact lists software requirements and business risks mapped
to the three pillars of information security?
A Formal business requirement
, B Informal business requirement
C Formal compliance requirement
D Informal security requirement
A D
B C
5 of 242
Term
____________ software attacks are highly repeatable, use general
targeting against a broad industry (e.g., military, finance, energy) or
groups of individuals (e.g., politicians, executives), and must have
long-term staying power.
HINT: They are less sophisticated in comparison to TACTICAL
threats and typically are lower in cost to develop and maintain.